1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
12

What is the purpose of a report?

Computers and Technology
2 answers:
alukav5142 [94]3 years ago
5 0
The one that makes most sense would be B since a report is based upon returned data
adoni [48]3 years ago
4 0

Answer:

B. To display data returned from a query in a specially formatted way

You might be interested in
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
3 years ago
What is required to display content on transparencies?
VladimirAG [237]
An overhead projector is required to display content on transparencies. A transparency is a thin sheet of plastic in which light is reflected upon to display content.The light source emits light towards the transparency and then the image is displayed on the wall. Usually, this light source comes from below and lights upward and so the content is depicted above or overhead.
6 0
3 years ago
USB flash drives are small portable units that are used to ____________files.
Juliette [100K]

Answer:D

Explanation: they do all of these

3 0
4 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
frutty [35]

Answer:

Yes

Explanation:

You are right well I think because same thing happened to me

6 0
4 years ago
Read 2 more answers
Other questions:
  • Complete the sentence about a focusing technique.
    7·1 answer
  • Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
    14·2 answers
  • Reputable firms often ask recent graduates to pay an up-front fee for a job.
    10·2 answers
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • With iteration-control systems, each team member ________. is given an account with a set of permissions is given their own priv
    6·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • The purpose of a function that does not return a value is
    13·1 answer
  • A heart murmur is caused by incorrect operation of ________?​
    7·1 answer
  • What is a computer? ​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!